Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 24,401 - 24,420 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.24s Refine Results
  1. 24401

    Protein Folding: Search for Basic Physical Models by Ivan Y. Torshin, Robert W. Harrison

    Published 2003-01-01
    “…In particular, elaboration of such simple models is likely to produce extremely effective computational techniques with value for modern genomics.…”
    Get full text
    Article
  2. 24402

    Distributed intelligent executive information system: pengaruhnya terhadap proses pembuatan keputusan eksekutif by Payamta Payamta

    Published 2018-08-01
    “… Arakel ini bertujuan untuk menjelaskan perkembangan computer based informa tion system yang mendukung fungsi eksekutif dalam decision makingprocess. …”
    Get full text
    Article
  3. 24403

    Modelling and Testing the Dynamic Properties of a Launcher with Unguided Missiles by Zbigniew J. DZIOPA, Maciej NYCKOWSKI

    Published 2022-12-01
    “…Unguided NLPR-70 missiles were launched. The launching process was recorded using a Phantom high-speed digital camera. …”
    Get full text
    Article
  4. 24404

    IDNet: An inception-like deformable non-local network for projection compensation over non-flat textured surfaces. by Yuqiang Zhang, Huamin Yang, Cheng Han, Chao Zhang, Chao Xu, Shiyu Lu

    Published 2025-01-01
    “…Projector compensation on non-flat, textured surfaces represents a formidable challenge in computational imaging, with conventional convolution-based methods frequently encountering critical limitations, especially in image edge regions characterized by complex geometric transformations. …”
    Get full text
    Article
  5. 24405

    Nonlinear transformation of complex amplitudes via quantum singular value transformation by Naixu Guo, Kosuke Mitarai, Keisuke Fujii

    Published 2024-12-01
    “…Due to the linearity of quantum operations, it is not straightforward to implement nonlinear transformations on a quantum computer, making some practical tasks like a neural network hard to achieve. …”
    Get full text
    Article
  6. 24406

    Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO

    Published 2019-02-01
    “…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
    Get full text
    Article
  7. 24407

    Adaptive Terminal Sliding Mode Fault-Tolerant Control of Spacecraft Based on the Left Attitude Error Function of SO(3) by Zhongzhong Zheng, Wei Shang, Zhou Liu, Yongda Guo

    Published 2023-01-01
    “…The controller designed based on the left attitude error description system of SO(3) has the features of small computational effort and simple design process. Finally, the numerical simulation of the attitude tracking error verifies the feasibility and high efficiency of the controller designed in this paper.…”
    Get full text
    Article
  8. 24408

    Study on the Flow and Acoustic Field of an Electronic Expansion Valve under Refrigeration Condition with Phase Change by Ziyang Liu, Chengjun Wu, Donghong Wang

    Published 2022-01-01
    “…There are high pressure gradient and velocity gradient in the flow field, and it also involves the process of flashing phase change, physical property change, and heat transfer, which is difficult to simulate directly. …”
    Get full text
    Article
  9. 24409
  10. 24410

    TECHNOLOGY OF MANUFACTURING OF TRANSISTOR STRUCTURES POWER ELECTRONICS by T. E. Sarkarov, B. A. Shangereeva, A. R. Shakhmaeva

    Published 2016-07-01
    “…Optimised process stages of the transistor structure formation have been proposed. …”
    Get full text
    Article
  11. 24411

    Robotic Cell Layout Optimization Using a Genetic Algorithm by Raúl-Alberto Sánchez-Sosa, Ernesto Chavero-Navarrete

    Published 2024-09-01
    “…This article suggests using an evolutionary computation algorithm (genetic algorithm) as a tool to solve this optimization problem. …”
    Get full text
    Article
  12. 24412

    Deep Web new data discovery strategy based on the graph model of data attribute value lists by Zhi-ming CUI, Peng-peng ZHAO, Xue-feng XIAN, Li-gang FANG, Yuan-feng YANG, Cai-dong GU

    Published 2016-03-01
    “…A novel deep Web data discovery strategy was proposed for new generated data record in resources.In the ap-proach,a new graph model of deep Web data attribute value lists was used to indicate the deep Web data source,an new data crawling task was transformed into a graph traversal process.This model was only related to the data,compared with the ex-isting query-related graph model had better adaptability and certainty,applicable to contain only a simple query interface of deep Web data sources.Based on this model,which could discovery incremental nodes and predict new data mutual infor-mation was used to compute the dependencies between nodes.When the query selects,as much as possible to reduce the negative impact brought by the query-dependent.This strategy improves the data crawling efficiency.Experimental results show that this strategy could maximize the synchronization between local and remote data under the same restriction.…”
    Get full text
    Article
  13. 24413
  14. 24414

    A Novel Ranking Method for Trapezoidal Fuzzy Soft Sets and Applications in Multicriteria Decision-Making by null P. G. Patil, Vyshakha Elluru, Sunil Jacob John, Baiju T.

    Published 2025-01-01
    “…They have a major influence on the decision-making process. Hence, the ranking of fuzzy numbers become more significant in solving such problems. …”
    Get full text
    Article
  15. 24415

    Cross-Linguistic Correspondences and Current Problems in Terminography by N. K. Riabtseva

    Published 2023-10-01
    “…A wide collection of corpus data, compiled for the last five years (over 1 mil. words) out of leading authentic journals and books in English on Natural Language Processing (NLP) and corresponding authentic texts in Russian, provided with translation of titles, abstracts and key words from Russian into English, as well as the analysis of computer translation systems, shows that contemporary English-Russian dictionaries and digital lexicographic resources need serious improvement. …”
    Get full text
    Article
  16. 24416

    Web services composition algorithm based on the location of backup service and probabilistic QoS model by Hua WEN

    Published 2016-10-01
    “…In the process of increasing the number of work-flow services, as the potential cost of the initial planning is high, and the reliability of many service composition algorithms is not enough. …”
    Get full text
    Article
  17. 24417

    Influence of Water Content on the Mechanical Characteristics of Mudstone with High Smectite Content by Feng Chen, Xiaoming Sun, Hao Lu

    Published 2022-01-01
    “…In this study, the water absorption characteristics of mudstone were obtained by a computer-automated WA (water absorption) equipment system experiments. …”
    Get full text
    Article
  18. 24418

    Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN by Wumaier HENIGULI

    Published 2016-04-01
    “…Finally,P2P trust model was used to compute trust value of each suspicious node,and the node with trust value was lower than the preset threshold as invasion of node. …”
    Get full text
    Article
  19. 24419

    A Grammar of Muqarnas: Drawings of the Alhambra by Jones and Goury (1834-1845) by Antonio Gámiz Gordo, Ignacio Ferrer Pérez-Blanco

    Published 2019-10-01
    “…After consideration of a few questions regarding the process of data collection in Granada, a comparative analysis is presented of a cornice, a capital, an arch and a pendentive, with photos and computer-aided drawings. …”
    Get full text
    Article
  20. 24420

    Decoding Romanian labour protests: insights from a topic modeling approach by Ciprian Panzaru, Gabriela Negoita

    Published 2025-05-01
    “…Using natural language processing (NLP) techniques, this study analyses press releases from Romania’s official news agency to identify recurring themes and patterns in union-led protests. …”
    Get full text
    Article